Skip to content
Snippets Groups Projects
  1. Apr 07, 2015
    • dcashman's avatar
      Enforce more specific service access. · 3cc6fc5f
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      diskstats
      display
      dreams
      dropbox
      ethernet
      fingerprint
      graphicstats
      hardware
      hdmi_control
      input_method
      input_service
      
      Bug: 18106000
      Change-Id: Iadd8aab9e78d9d39fb00cf0b5a95fa1927d02095
      3cc6fc5f
    • Fyodor Kupolov's avatar
      Allow system_server to read oat dir · 3af8c9d0
      Fyodor Kupolov authored
      Required for PackageManagerService to perform restorecon recursively on a
      staging dir.
      
      Addresses the following denial:
      avc: denied { open } for name="oat" dev="mmcblk0p28" ino=163027 scontext=u:r:system_server:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=dir
      
      Bug: 19550105
      Bug: 20087446
      Change-Id: I0f6ebb79745091ecb4d6d3dbe92f65606b7469da
      3af8c9d0
    • dcashman's avatar
      Enforce more specific service access. · d4c78f4b
      dcashman authored
      Move the following services from tmp_system_server_service to appropriate
      attributes:
      
      battery
      bluetooth_manager
      clipboard
      commontime_management
      connectivity
      content
      country_detector
      device_policy
      deviceidle
      
      Bug: 18106000
      Change-Id: I0d0f2a075c0509a783631d88ba453ac13399cdf2
      d4c78f4b
    • Jeff Sharkey's avatar
      Allow installd to dexopt apps on expanded storage. · 44c95e9a
      Jeff Sharkey authored
      avc: denied { search } for name="expand" dev="tmpfs" ino=3130 scontext=u:r:installd:s0 tcontext=u:object_r:mnt_expand_file:s0 tclass=dir permissive=0
      
      Bug: 19993667
      Change-Id: Ie53df62aa79ae14cd56d7c6f2429b4be382164d1
      44c95e9a
    • Jeff Sharkey's avatar
      Initial policy for expanded storage. · 73d9c2a9
      Jeff Sharkey authored
      Expanded storage supports a subset of the features of the internal
      data partition.  Mirror that policy for consistency.  vold is also
      granted enough permissions to prepare initial directories.
      
      avc: denied { write } for name="ext" dev="tmpfs" ino=3130 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { add_name } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { create } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { setattr } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=7243 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      avc: denied { mounton } for path="/mnt/ext/57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=7243 scontext=u:r:vold:s0 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      
      avc: denied { getattr } for path="/mnt/ext" dev="tmpfs" ino=3130 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:mnt_ext_file:s0 tclass=dir permissive=1
      
      avc: denied { setattr } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=4471 scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
      avc: denied { getattr } for path="/mnt/expand/57f8f4bc-abf4-655f-bf67-946fc0f9f25b/media" dev="dm-0" ino=145153 scontext=u:r:vold:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1
      
      avc: denied { rmdir } for name="57f8f4bc-abf4-655f-bf67-946fc0f9f25b" dev="tmpfs" ino=6380 scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
      
      avc: denied { create } for name="tmp" scontext=u:r:vold:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1
      avc: denied { setattr } for name="tmp" dev="dm-0" ino=72578 scontext=u:r:vold:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1
      
      Bug: 19993667
      Change-Id: I73c98b36e7c066f21650a9e16ea82c5a0ef3d6c5
      73d9c2a9
  2. Apr 06, 2015
    • Andres Morales's avatar
      SELinux permissions for gatekeeper TEE proxy · e207986e
      Andres Morales authored
      sets up:
      - execute permissions
      - binder permission (system_server->gatekeeper->keystore)
      - prevents dumpstate and shell from finding GK binder service
      - neverallow rules for prohibited clients
      
      Change-Id: I1817933a91de625db469a20c7a4c8e2ca46efa1e
      e207986e
    • Nick Kralevich's avatar
      dumpstate: allow df on /storage/emulated · c24d90cb
      Nick Kralevich authored
      dumpstate runs "df" on all mounted filesystems. Allow dumpstate
      to access /storage/emulated so df works.
      
      Addresses the following denial:
      
        avc: denied { search } for pid=4505 comm="df" name="/" dev="tmpfs" ino=6207 scontext=u:r:dumpstate:s0 tcontext=u:object_r:storage_file:s0 tclass=dir
      
      Change-Id: I99dac8321b19952e37c0dd9d61a680a27beb1ae8
      c24d90cb
    • dcashman's avatar
      Assign app_api_service attribute to services. · 4cdea7fc
      dcashman authored
      Assign the alarm, appwidget, assetatlas, audio, backup and batterystats services
      the appropriate service access levels and move into enforcing.
      
      Bug: 18106000
      Change-Id: If3210bb25f3076edfdb6eec36ef6521ace1bd8d7
      4cdea7fc
  3. Apr 03, 2015
  4. Apr 02, 2015
    • Nick Kralevich's avatar
      netd dontaudit fsetid · 8d200817
      Nick Kralevich authored
      For the reasons explained in the pre-existing code, we don't want
      to grant fsetid to netd, nor do we want denial messages to be
      generated.
      
      Change-Id: I34dcea81acd25b4eddc46bb54ea0d828b33c5fdc
      8d200817
    • Fyodor Kupolov's avatar
      Support for storing OAT files in app directory · b87a4b16
      Fyodor Kupolov authored
      oat dir inside apk_tmp_file should be labeled as dalvikcache_data_file.
      
      Bug: 19550105
      Change-Id: Ie928b5f47bfc42167bf86fdf10d6913ef25d145d
      b87a4b16
    • Nick Kralevich's avatar
      b62b2020
    • Johan Redestig's avatar
      nfc: allow sending bugreports via nfc · 386a0f09
      Johan Redestig authored
      Same change as 9819a6 but for nfc.
      
      Nfc can receive bugreport data for beaming to another device.
      This comes across as an open file descriptor. Allow nfc access
      to bugreports.
      
      Addresses the following denial:
      
        avc: denied { read } for path="/data/data/com.android.shell/files/bugreports/bugreport-2015-03-30-04-49-57.txt" dev="mmcblk0p27" ino=82334 scontext=u:r:nfc:s0 tcontext=u:object_r:shell_data_file:s0 tclass=file op_res=-13 ppid=435 pcomm="main" tgid=23475 tgcomm="m.android.shell"
      
      Change-Id: I3efefcdb46444a1a6520803cb5e68bbdf29d3ad6
      386a0f09
    • Nick Kralevich's avatar
      domain: relax execmod restrictions · 998ce77f
      Nick Kralevich authored
      Some devices still have pre-built binaries with text relocations
      on them. As a result, it's premature to assert a neverallow rule
      for files in /system
      
      Bug: 20013628
      Change-Id: I3a1e43db5c610164749dee6882f645a0559c789b
      998ce77f
  5. Apr 01, 2015
  6. Mar 31, 2015
    • Chad Brubaker's avatar
      Add keystore add_auth · 8927772c
      Chad Brubaker authored
      This is for the new addAuthToken keystore method from
      I7f7647d9a36ea453ec6d62fc84087ca8f76e53dd. These tokens will be used to
      authorize keymaster operations. The tokens are HMAC'd and so shouldn't
      be fakeable but this is still limited to system_server only.
      
      Change-Id: I3ff46b676ecac8a878d3aa0a25ba9a8b0c5e1f47
      8927772c
    • Jeff Sharkey's avatar
      Separate fsck domains to protect userdata. · 5a5b364c
      Jeff Sharkey authored
      Create new vold_fsck domain that only has access to vold_block
      devices to prevent any access to internal userdata.
      
      Change-Id: I25ddcd16cbf83d7a25b70bc64d95f5345d0d5731
      5a5b364c
    • Sami Tolvanen's avatar
      Fix block_suspend denial for slideshow · 5895ffe1
      Sami Tolvanen authored
      Add wakelock_use to slideshow.te to fix the following denial:
      
      avc:  denied  { block_suspend } for  pid=137 comm="slideshow" capability=36  scontext=u:r:slideshow:s0 tcontext=u:r:slideshow:s0 tclass=capability2 permissive=0
      
      Change-Id: If84f167cd235e8196eadf3fb85cc725a5ea464e6
      5895ffe1
    • Kazuki Nakayama's avatar
      Allow dumpstate to read symlink under dalvik-cache · 9103c975
      Kazuki Nakayama authored
      This fixes the following policy violation:
      avc: denied { read } pid=30295 comm="app_process"
      tcontext=u:object_r:dalvikcache_data_file:s0
      scontext=u:r:dumpstate:s0 tclass=lnk_file
      permissive=0 ppid=26813 pcomm="dumpstate"
      pgid=26813 pgcomm="dumpstate"
      
      See 0e32726 in app.te for a symmetrical
      change.
      
      Change-Id: Iecbccd5fd0046ec193f08b26f9db618dee7a80c1
      9103c975
    • Jeff Sharkey's avatar
      Fix small copy/paste bug in recent shell rule. · 983e2afe
      Jeff Sharkey authored
      Change-Id: Ia279dfd11cc093e066bff66d7397dfe9e906aba8
      983e2afe
Loading